张伟哲,方滨兴.基于信任QOS增强的网格服务调度算法[J].计算机学报,2006,29(7):1157-1166.ZHANG Wei-zhe,FANG Bin-xing.Atrust-QoS enhanced grid service schedeling[J].Chinese Journal of Computers,2006,29(7):1157-1166.(in Chinese)
[2]
GUMMADI P K,SAROIU S,GRIBBLE S D.A measurement study of napster and gnutella as examples of peer-to-peer filesharing systems[J].Acm Sigcomm Computer Communication Review,2002,32(1):82-84.
[3]
ION S,ROBERTM.Chord:A scalable peer-to-peer lookup protocol for internet applications[J].IEEE/ACMTransactionson Networking(TON),2003,11(1):17-32.
[4]
FREDRIK B,LARS A.Performance of pastry in a heterogeneous system[C]∥Proceedings of the 4th International Conferenceon Peer-to-Peer Computing(P2P 04).Zurich,Switzerland:IEEE Computer Society,2004:278-279.
[5]
RITA C,WILLIAMY.Poblano:ADistributed Trust Model for Peer-to-Peer Networks[EB/OL].Sun Microsystems TechnicalPaper,2000.[2010-05-01].http://www.sun.com/software/jxta/poblano.pdf.
[6]
THEODORAKOPOULOS G,BARAS J S.Trust evaluation in ad-hoc networks[C]∥Proceeding the 2004 ACM workshop onWireless security.Philadelphia:ACM Press,2004:1-10.
[7]
LIU K,ABU-GHAZALEHN,KANG K D.Location verification and trust management for resilient geographic routing[J].Parallel Distrib Computer,2007,67(2):215-228.
[8]
REN K,LI T,WAN Z,et al.Highly reliable trust establishment scheme in ad hoc networking[J].Computer Networks,2004,45(6):687-699.
[9]
PIRZADA A A,DATTA A,MCDONALD C.Incorporating trust and reputation in the DSR protocol for dependable routing[J].Computer Communications,2006,29(15):2806-2821.
[10]
DASKAPAN S,VREE W G,ELDIN A A.Trust metrics for survivable security systems[C]∥The IEEE InternationalConference on System,Man and Cybernetics.Washington:IEEE Computer Society,2003,4(5-8):3128-3135.
[11]
LIK M,MOJDEHM,ARI HA.Computational mode of trust and reputation[C]∥The 35th Hawaii International Conferenceon System Sciences.Hawaii:IEEE Computer Society,2002:2431-2439.